10
PROJECT TITLES FOR ACADEMIC YEAR 2017 2018 For: - B. E | B. Tech | M. E | M. Tech | MCA | BCA | Diploma |MS |M. Sc | IEEE REAL TIME PROJECTS& TRAINING GUIDE SOFTWARE & EMBEDDED #19, MN Complex, 2 nd Cross, Sampige Main Road, Malleswaram, Bangalore 560003 Call Us: 7019280372/9590544567 / 9739066172, www.makefinalyearproject.com www.igeekstechnologies.com Land Mark: Opposite Joyalukkas Gold Showroom, Near to Mantri Mall www.makefinalyearproject.com HPE COC TRAINING CENTER

 · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

PROJECT TITLES FOR ACADEMIC YEAR 2017 – 2018

For: - B. E | B. Tech | M. E | M. Tech | MCA | BCA | Diploma |MS |M. Sc |

IEEE REAL TIME PROJECTS& TRAINING GUIDE

SOFTWARE & EMBEDDED

#19, MN Complex, 2nd Cross, Sampige Main Road, Malleswaram, Bangalore – 560003

Call Us: 7019280372/9590544567 / 9739066172, www.makefinalyearproject.com

www.igeekstechnologies.com Land Mark: Opposite Joyalukkas Gold Showroom, Near to Mantri Mall

www.makefinalyearproject.com

HPE COC TRAINING CENTER

Page 2:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

HPE COC TRAINING PROGRAMMS:

IGEEKS, providing quality, industry oriented programs are at forefront of our motto. Our training programs are among the most sought after

by the industry which is offered to both experienced and fresher’s alike. We strive to bring the latest and advanced courses to our students

in order to equip them with the most sought after skill-sets required by the industry. In our quest for offering quality, industry ready skills

for our students, we are proud to announce that we are now an Authorized delivery partner for Hewlett Packard Enterprise (HPE). With us

collaborating with our esteemed partner HPE, we now offer top of the class, industry oriented and HPE certified courses to our students to

make them industry ready on completion of a course from a wide variety of HPE certified programs. These courses are available to fresh

graduates as well as experienced candidates.

Here's a cursory glance at some of the courses offered by HPE across key Indian cities - Programming Techniques using 'C', PHP, VLSI, VHDL

& PCB Design, Data Structure using C Language, Core Java, J2EE - Hibernate with Spring Framework, J2EE - Struts with Hibernate Framework,

Android, ASP.NET With C#, Embedded & Robotics-Basics & Advanced, ARM, Linux Administration with Scripting, Networking concepts with

security.

The advantages of our HPE certified programs are: Programs delivered by certified professionals by HPE.

Certification directly by HPE is globally recognized with no refreshing period.

Curriculum designed by industry experts from HPE. Thereby providing training in latest technologies.

Adds significant weight age to a candidates' profile, enhancing their career prospects.

Every student would be given HPE courseware, notepad and pen along with an online examination voucher.

Certificate would be issued after he/she successfully completes the assessment exam.

If you require any further information regarding the courses, feel free to contact US: Malleswaram/JayaNagar-9739066172.

Be HPE Certified

Android Asp.net With C#

Big Data-Programming&Development Core Java

Core Java with Android

Embedded & Robotics Basics and Advanced

J2EE-Struts with Hibernate Framework

PHP with WordPress

Programming Techniques Using C and C++ VLSI VHDL & PCB Design

Page 3:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

S.No PROJECT TITLES (2017-2018) Year

MCA PROJECT TITLES

IMAGE PROCESSING

1 Automatic Generation of Social Event Storyboard from Image Click-through Data IEEE 2017

2 Image Re-ranking based on Topic Diversity IEEE 2017

3 Tri-Clustered Tensor Completion for Social-Aware Image Tag Refinement IEEE 2017

4 A Locality Sensitive Low-Rank Model for Image Tag Completion IEEE 2016

5 Tag Based Image Search by Social Re-ranking IEEE 2016

6 Web Image Search Re-ranking with Click-based Similarity and Typicality IEEE 2016

7 A Mixed Generative Discriminative Based Hashing Method IEEE 2016

8 Semantic Concept Co-occurrence Patterns for Image Annotation and Retrieval IEEE 2016

9 An Attribute-Assisted Reranking Model for Web Image Search IEEE 2015

10 Learning to Rank Image Tags with Limited Training Examples IEEE 2015

11 Multiview Alignment Hashing for Efficient Image Search IEEE 2015

12 Captcha as Graphical Passwords—A New Security Primitive Based on Hard AI Problems IEEE 2014

13 Personalized Geo-Specific Tag Recommendation for Photos Social websites IEEE 2014

14 Learning and Recognition of On-Premise Signs from Weakly Labeled Street View Image IEEE 2014

15 Learn to Personalized Image Search from the Photo Sharing Websites IEEE 2012

16 A Personal Authentication Based on IRIS Recognition IEEE

17 Noise Reduction By Fuzzy Image Filtering IEEE

18 Script identification through temporal Sequence of the Strokes IEEE

NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS/ PARALLEL AND

DISTRIBUTED SYSTEM/ SECURE COMPUTING/ IOT 19 NetSpam: a Network-based Spam Detection Framework for Reviews in Online Social Media IEEE 2017

20 Network Capability in Localizing Node Failures via End-to-End Path Measurements IEEE 2017

21 Privacy and Integrity Preserving Top-k Query Processing for Two-Tiered Sensor Network IEEE 2017

22 Routing in Accumulative Multi-Hop Networks IEEE 2017

23 A Credibility Analysis System for Assessing Information on Twitter IEEE 2017

24 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data IEEE 2017

25 My Privacy My Decision: Control of Photo Sharing on Online Social Networks IEEE 2017

26 SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks IEEE 2017

27 Search Rank Fraud and Malware Detection in Google Play IEEE 2017

28 Towards Detecting Compromised Accounts on Social Networks IEEE 2017

29 Efficient and Privacy-preserving Polygons Spatial Query Framework for Location-based Services IEEE 2017

30 Follow But No Track: Privacy Preserved Profile Publishing in Cyber-Physical Social Systems IEEE 2017

31 SPFM: Scalable and Privacy-preserving Friend Matching in Mobile Cloud IEEE 2017

32 iASK: A Distributed Q&A System Incorporating Social Community and Global Collective Intelligence IEEE 2017

33 Improving Automated Bug Triaging with Specialized Topic Model (SE) IEEE 2017

34 Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks

IEEE2017

35 A Shoulder Surfing Resistant Graphical Authentication System IEEE 2016

36 Cyberbullying Detection based on Semantic-Enhanced Marginalized Denoising Auto-Encoder IEEE 2016

37 FRAppE Detecting Malicious Facebook Applications IEEE 2016

38 FRoDO: Fraud Resilient Device for Off-line micro-payments IEEE 2016

39 Mitigating Cross-Site Scripting Attacks with a Content Security Policy IEEE 2016

40 STAMP: Enabling Privacy-Preserving Location Proofs for Mobile Users IEEE 2016

41 A Hop-by-Hop Routing Mechanism for Green Internet IEEE 2016

42 EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data IEEE 2016

43 Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach IEEE 2016

44 Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks IEEE 2016

45 Continuous Answering Holistic Queries over Sensor Networks IEEE 2016

46 Geometric Range Search on Encrypted Spatial Data IEEE 2016

Page 4:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

47 Secure and Efficient Data Communication Protocol for Wireless Body Area Networks IEEE 2016

48 Anonymity-based Privacy-preserving Data Reporting for Participatory Sensing (IOT) IEEE 2015

49 Cost-Effective Authentic and Anonymous Data Sharing with Forward Security IEEE 2015

50 Continuous and Transparent User Identity Verification for Secure Internet Services IEEE 2015

51 Trust-based Service Management for Social Internet of Things Systems IEEE 2015

52 Access Control in Decentralized Online Social Networks: Applying a Policy-Hiding Cryptographic Scheme and Evaluating Its Performance

IEEE 2014

53 A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis IEEE 2014

54 Asymmetric Social Proximity Based Private Matching Protocols for Online Social Networks IEEE 2014

55 A Two-Stage Deanonymization Attack Against Anonymized Social Networks IEEE 2014

56 Community-home-based Multi-copy Routing in Mobile Social Networks IEEE 2014

57 Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks IEEE 2014

58 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage IEEE 2014

59 Map-Aware Models for Indoor Wireless Localization Systems IEEE 2014

60 Privacy-Preserving Optimal Meeting Location Determination on Mobile Devices IEEE 2014

61 Secure Data Retrieval For Decentralized Disruption-Tolerant Military Networks IEEE 2014

62 CAM: Cloud-Assisted Privacy Preserving Mobile Health Monitoring IEEE 2013

63 Fully Anonymous Profile Matching in Mobile Social Networks IEEE 2013

64 Mobile Relay Configuration in Data-Intensive Wireless Sensor Networks IEEE 2013

65 Optimum Relay Selection for Energy-Efficient Cooperative Ad Hoc Networks IEEE 2013

66 Participatory Privacy: Enabling Privacy in Participatory Sensing IEEE 2013

67 TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing IEEE 2013

68 Vampire attacks: Draining life from wireless ad-hoc sensor networks IEEE 2013

69 Online Modeling of Proactive Moderation System for Auction Fraud Detection IEEE 2012

71 Packet-Hiding Methods for Preventing Selective Jamming Attacks IEEE 2012

72 Privacy- and Integrity-Preserving Range Queries in Sensor Networks IEEE 2012

73 A Distributed Algorithm for Finding All Best Swap Edges of a Minimum Diameter Spanning Tree IEEE 2011

74 A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks IEEE 2011

75 Delay Analysis and Optimality of Scheduling Policies for Multi-Hop Wireless Networks IEEE 2011

76 Design and Implementation of Addressing Mental Health Epidemic among University Students via Web-based, Self-Screening and Referral System

IEEE 2011

77 Modeling and Detection of Camouflaging Worm. IEEE 2011

78 Nymble: Blocking Misbehaving Users in Anonym zing Networks IEEE 2011

79 SAT:A Security Architecture Achieving Anonymity and Traceability in Wireless IEEE 2011

80 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks IEEE 2011

81 Achieving Network Level Privacy in Wireless Sensor Networks IEEE 2010

82 Bandwidth Recycling in IEEE 802.16 Networks IEEE 2010

83 Host-to-Host Congestion Control for TCP IEEE 2010

84 Label-Based DV-Hop Localization against Wormhole Attacks In Wireless Sensor Networks IEEE 2010

85 A Bidirectional Routing Abstraction for Asymmetric Mobile Ad Hoc Networks IEEE

86 Distributed Cache Updating Using Dynamic Source Routing Protocol IEEE

CLOUD COMPUTING

87 A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users IEEE 2017

88 A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification IEEE 2017

89 A robust reputation management mechanism in the federated cloud IEEE 2017

90 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud IEEE 2017

91 Fast Phrase Search for Encrypted Cloud Storage IEEE 2017

92 Privacy-Preserving Multi keyword Similarity Search Over Outsourced Cloud Data IEEE 2017

93 RAAC: Robust and Auditable Access Control with Multiple Attribute Authorities for Public Cloud Storage IEEE 2017

94 Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption IEEE 2017

95 TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud IEEE 2017

96 TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud IEEE 2017

97 Dynamic-Hash-Table Based Public Auditing for Secure Cloud Storage IEEE 2017

98 A Secure Anti-Collusion Data Sharing Scheme for Dynamic Groups in the Cloud IEEE 2016

Page 5:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

99 Circuit Cipher text-policy Attribute-based Hybrid Encryption with Verifiable Delegation in Cloud Computing IEEE 2016

100 DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments IEEE 2016

101 SecRBAC: Secure data in the Clouds IEEE 2016

102 Secure Optimization Computation Outsourcing in Cloud Computing: A Case Study of Linear Programming IEEE 2016

103 Attribute-Based Data Sharing Scheme Revisited in Cloud Computing IEEE 2016

104 Dynamic Hash Table Based Public Auditing for Secure Cloud Storage IEEE 2016

105 Efficient and Expressive Keyword Search Over Encrypted Data in Cloud IEEE 2016

106 Dynamic and Public Auditing with Fair Arbitration for Cloud Data IEEE 2016

107 A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data IEEE 2016

108 Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates IEEE 2016

109 Audit-Free Cloud Storage via Deniable Attribute-based Encryption IEEE 2015

110 Provable Multicopy Dynamic Data Possession in Cloud Computing Systems IEEE 2015

111 Key-Aggregate Searchable Encryption (KASE) for Group Data Sharing via Cloud Storage IEEE 2015

112 Control Cloud Data Access Privilege and Anonymity with Fully Anonymous Attribute based Encryption IEEE 2015

113 EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service IEEE 2015

114 CHARM: A Cost-efficient Multi-cloud Data Hosting Scheme with High Availability IEEE 2015

115 Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage IEEE 2015

116 Discovery of Ranking Fraud for Mobile Apps IEEE 2015

117 Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation IEEE 2015

118 Secure Distributed Deduplication Systems With Improved Reliability IEEE 2015

119 Secure Auditing and Deduplicating Data in Cloud IEEE 2015

120 T-Broker: A Trust-Aware Service Brokering Scheme For Multiple Cloud Collaborative Services IEEE 2015

121 A Cloud Environment for Backup and Data Storage IEEE 2014

122 A Hybrid Cloud Approach for Secure Authorized Deduplication IEEE 2014

123 Cloud-Assisted Mobile-Access of Health Data With Privacy and Audit ability IEEE 2014

124 Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud IEEE 2014

125 VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data IEEE 2014

126 AMES-Cloud: A Framework of Adaptive Mobile Video Streaming and Efficient Social Video Sharing in the Clouds IEEE 2013

127 Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment IEEE 2013

128 Privacy-Preserving Public Auditing for Secure Cloud Storage IEEE 2013

129 Cloud Computing Security: From Single to Multi-Clouds IEEE 2012

130 Ensuring Distributed Accountability For Data Sharing in The Cloud IEEE 2012

131 Secure and Practical Outsourcing of Linear Programming in Cloud Computing IEEE 2011

132 Ensuring Data Storage Security in Cloud Computing IEEE 2010

KNOWLEDGE AND DATA ENGINEERING PROJECTS/DATA MINING/WEB MINING /BIG DATA

133 Analyzing Sentiments in One Go: A Supervised Joint Topic Modeling Approach IEEE 2017

134 Detecting Stress Based on Social Interactions in Social Networks IEEE 2017

135 Efficient Clue-based Route Search on Road Networks IEEE 2017

136 Mining Competitors from Large Unstructured Datasets IEEE 2017

137 Efficient Keyword-aware Representative Travel Route Recommendation IEEE 2017

138 l-Injection: Toward Effective Collaborative Filtering Using Uninteresting Items IEEE 2017

139 PPRank: Economically Selecting Initial Users for Influence Maximization in Social Networks IEEE 2017

140 RAPARE: A Generic Strategy for Cold-Start Rating Prediction Problem IEEE 2017

141 Design and Development of an Intelligent Web Application for Direct Consumer to Consumer Trading over Internet

IEEE 2017

142 A Rating Approach based on Sentiment Analysis IEEE 2017

143 Applying Data Mining Techniques in Cyber Crimes IEEE 2017

144 Predicting Political Mood Tendencies based on Twitter Data IEEE 2017

145 Extraction of Action Rules for Chronic Kidney Disease using Naïve Bayes Classifier IEEE 2017

146 A Novel Recommendation Model Regularized with User Trust and Item Ratings IEEE 2016

147 Connecting Social Media to E-Commerce: Cold-Start Product Recommendation using Microblogging Information IEEE 2016

148 Sentiment Embedding’s with Applications to Sentiment Analysis IEEE 2016

149 Rating Prediction based on Social Sentiment from Textual Reviews IEEE 2016

151 Personalized Travel Sequence Recommendation on Multi-Source Big Social Media IEEE 2016

Page 6:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

152 Cross-Platform Identification of Anonymous Identical Users in Multiple Social Media Networks IEEE 2016

153 Resolving Multi-party Privacy Conflicts in Social Media IEEE 2016

154 Booster in High Dimensional Data Classification IEEE 2016

155 Domain-Sensitive Recommendation with User-Item Subgroup Analysis IEEE 2016

156 Nearest Keyword Set Search in Multi-Dimensional Datasets IEEE 2016

157 Quantifying Political Leaning from Tweets, Retweets, and Re tweeters IEEE 2016

158 Top-Down XML Keyword Query Processing IEEE 2016

159 User-Service Rating Prediction by Exploring Social Users’ Rating Behaviors IEEE 2016

160 Profiling Online Social Behaviors for Compromised Account Detection IEEE 2016

161 Best Keyword Cover Search IEEE 2015

162 Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model IEEE 2015

163 Domain-Specific Key phrase Extraction and Near-Duplicate Article Detection based on Ontology IEEE 2015

164 Framework For Surveillance of Instant Messages in Instant Messengers IEEE 2015

165 THE SAFE MINER: A Fine Grained Aspect Level Approach for Resolving the Sentiment IEEE 2015

166 SmartCrawler: A Two-Stage Crawler For Efficiently Harvesting Deep-Web Interfaces IEEE 2015

167 Structured Learning from Heterogeneous Behavior for Social Identity Linkage IEEE 2015

168 Trust-based Service Management for Social Internet of Things Systems IEEE 2015

169 Dealing With Concept Drifts in Process Mining IEEE 2014

170 Personalized Recommendation Combining User Interest and Social Circle IEEE 2014

171 Personalized Web search Using Browsing History And Domain Knowledge IEEE 2014

172 Privacy Preserving and Content Protecting Location based Queries IEEE 2014

173 Supporting Privacy Protection in Personalized Web Search IEEE 2014

174 A Fast Clustering-Based Feature Subset Selection Algorithm for High Dimensional Data IEEE 2013

175 A System to Filter Unwanted Messages from OSN Uses Walls IEEE 2013

176 Anomaly Detection via Online Oversampling Principal Component Analysis. IEEE 2013

177 Multiparty Access Control for Online Social Networks: Model and Mechanisms IEEE 2013

178 Ranking Model Adaptation For Domain-Specific Search IEEE 2012

179 Extended XML Tree Pattern Matching: Theories and Algorithms IEEE 2011

180 Ranking Spatial Data by Quality Preferences IEEE 2011

MOBILE COMPUTING / ANDROID APP

181 Catch Me If You Can Evaluating Android Anti Malware Against Transformation Attacks

182 Android Based Voting System

183 Restaurant Table Order Management System

184 Tollgate payment System

185 Insurance and Banking Notifier

186 I-Student

187 Real Estate Investing Property Management

188 Online shopping Android Application

189 Android Attack Application

190 Android Event Scheduler /Reminder Application

191 Android Student Result Analyzing System

192 Insurance in android

193 M-banking

194 Mobile Invoice (Mobile Billing)

195 Mobile Location Alarm

196 Mobi Travel Guide – Smart way to travel

197 Remote PC Administration Using J2ME

198 SIP – Session Initiation Protocol (M-Conference)

199 VAS for Hand Held Device-MM7 Protocol implementation

200 Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor S/B

Page 7:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

WEB APPLICATIONS PROJECTS (J2EE) (JSP, JDBC, MYSQL & ORACLE)

201 108 - Public Health Emergency Services

202 Aadhaar Secure Travel Identity

203 Appositeness Intendance (Health Card)

204 Secured Integration Of Blood Bank Management

205 Company Information Tracking System (CITS)

206 Complaint Management system

207 Corporate Recruitment System (CRS)

208 DCMS (Distributed channel management system)

209 Disposition Prospectus (Government Schemes Management System)

210 E Transaction Interface (Payment Gate way for all banks)

211 Farmers Buddy

212 Bug Tracking System J2ee Application Project

213 Loan Monitoring System

214 Local Service Center

215 Medi Tracker

216 Monitoring Online Tests through Data Visualization

217 Mortal Policy Outline (insurance company)

218 Movie Rating And Review Summarization

219 Movie Rental

220 Online Crime File Management System

221 Cartel Communique ( multi-conference)

222 Collaborative White Board

223 Concurrent Train Simulation Core Java Project

224 Online Mental Health Screenings System

225 Online Registration For Voter Card

226 Online Tourism

227 Online travel and personal package Recommendation

228 Online University

229 Payroll Management system

230 Real estate Investing Property Management

231 Training And Placement System

232 Value added sales tax information system

233 Vehicle Management and Booking System

234 Virtual office Management

235 Electorate Conspiracy (Automated e-Govt Certificates)

236 Embedding the Secure Data In An Audio/Video and Image Files

237 E-Zest (resort management)

238 Global Tracker

239 Hostel Management System

240 Hotel food order system

241 Intrusion Detection System

242 Library Management System (Core Java(Swings) &MySQL)

243 Medical Store Management System

244 Orkut Using Java

245 Payroll Accounting System (Core Java(Swings) &MySQL)

246 Secure Data Transmission

247 Student Management System (Core Java(Swings) &MySQL)

248 Tanrox Work Force (Activity Control System)

249 Telecom Inventory Management System

250 Text Editor

251 Airline Reservation System

252 ATM Management System

253 Automatic DB Schema Generation

Page 8:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

254 Automatic Number Plate Recognization

PHP APPLICATION BASED PROJECTS (PHP & MYSQL)- BCA/MCA STUDENTS 255 Avoid Food Wastage_PHP

256 Blood Bank Management

257 Complain Management System_PHP

258 Courier Management System_PHP

259 Facebook App_PHP

260 Hospital Management

261 Intranet Mailing System_PHP

262 Job portal system

263 Leave Management For MNC

264 Online Bidding_PHP

265 Online Book Shop.Com_PHP

266 Online home appliance_PHP

267 Online Notice Board_PHP

268 Online Polling For Publishers And Brands

269 Online Shopping_PHP

270 Online Tour(My Tour)

271 Pharmacy Management System

272 Real estate Investing Property Management

273 Secure File Downloading System

274 Statistical Entity Extraction from Web_PHP

275 Student Information System_PHP

276 Web Based Learning System

277 Web Doctor

Page 9:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS
Page 10:  · 17 Noise Reduction By Fuzzy Image Filtering IEEE 18 Script identification through temporal Sequence of the Strokes IEEE NETWORKING / NETWORK SECURITY / WIRELESS COMMUNICATIONS

Head Office: No.1 Rated company in Bangalore for all

software courses and Final Year Projects IGeekS Technologies No:19, MN Complex, 2nd Cross, Sampige Main Road, Malleswaram, Bangalore Karnataka (560003) India. Above HOP Salon, Opp. Joyalukkas, Malleswaram, Land mark : Near to Mantri Mall, Malleswaram Bangalore. Email: [email protected] ,

[email protected]

Office Phone: 7019280372 /9590544567 / 9739066172 Contact Person: Mr. Nandu Y, Director-Projects, Mobile: 9590544567, E-mail: [email protected] [email protected]

Partners Address:

RAJAJINAGAR: JAYANAGAR:

#531, 63rd Cross, 12th Main, after sevabhai hospital, 5th Block, Rajajinagar, Bangalore-10. Landmark: Near bashyam circle.

No 346/17, Manandi Court, 3rd Floor, 27th Cross, Jayanagar 3rd Block East, Bangalore - 560011, Near BDA Complex.

More than 12 years’ experience in IEEE Final Year Project Center, IGEEKS Technologies Supports you

in Java, Dotnet, Image Processing, Embedded, VLSI, MATLAB, Power Electronics, Power System

Technologies.

For Titles and Abstracts visit our website www.makefinalyearproject.com

For HPE COC Training Programmes

Please visit our website:

www.makefinalyearproject.com/HPE-Training.htm